L2TP Network Server. LNS Service Operation

Size: px
Start display at page:

Download "L2TP Network Server. LNS Service Operation"

Transcription

1 This chapter describes the support for Layer 2 Tunneling Protocol (L2TP) Network Server (LNS) functionality on Cisco ASR 5500 chassis and explains how it is configured. The product Administration Guides provide examples and procedures for configuration of basic services on the system. It is recommended that you select the configuration example that best meets your service model, and configure the required elements for that model, as described in the respective product Administration Guide, before using the procedures in this chapter. Important The Layer 2 Tunneling Protocol (L2TP) Network Server (LNS) is a licensed Cisco feature. A separate feature license may be required. Contact your Cisco account representative for detailed information on specific licensing requirements. For information on installing and verifying licenses, refer to the Managing License Keys section of the Software Management Operations chapter in the System Administration Guide. When enabled though the session license and feature use key, LNS functionality is configured as context-level services on the system. LNS services support the termination of L2TP encapsulated tunnels from L2TP Access Concentrators (LACs) in accordance with RFC Important The LNS service uses UDP ports through as the source port for receiving packets from the LAC. You can force the LNS to only use the standard L2TP port (UDP Port 1701) with the single-port-mode LNS service configuration mode command. Refer to the Command Line Interface Reference for more information on this command. LNS Service Operation, page 1 Configuring the System to Support LNS Functionality, page 8 LNS Service Operation As mentioned previously, LNS functionality on the system is configured via context-level services. LNS services can be configured in the same context as other services supported on the system or in its own context. Each context can support multiple LNS services. 1

2 Information Required One of the most simple configuration that can be implemented on the system to support Simple IP data applications requires that two contexts (one source and one destination) be configured on the system as shown in the following figure. Figure 1: LNS Configuration Example The source context facilitates the LNS service(s) and the PDN and AAA interfaces. The PDN interface is bound to the LNS service and connects L2TP tunnels and sessions from one or more peer LACs. The source context is also be configured to provide AAA functionality for subscriber sessions. The destination context facilitates the packet data network interface(s) and can optionally be configured with pools of IP addresses for assignment to subscriber sessions. In this configuration, the LNS service in the source context terminates L2TP tunnels from peer LACs and routes the subscriber session data through the destination context to and from a packet data network such as the Internet or a home network. Information Required Prior to configuring the system as shown in figure above, a minimum amount of information is required. The following sections describe the information required to configure the source and destination contexts. Source Context Configuration The following table lists the information that is required to configure the source context. Table 1: for Source Context Configuration Source context name numeric) by which the source context will be recognized by the system. 2

3 Information Required PDN Interface Configuration PDN interface name IP address and subnet Physical port number Physical port description Gateway IP address numeric) by which the interface will be recognized by the system. Multiple names are needed if multiple interfaces will be configured. These PDN interfaces facilitates the L2TP tunnels/sessions from the LAC and are configured in the source context. These will be assigned to the PDN interface. Multiple addresses and/or subnets are needed if multiple interfaces will be configured. This specifies the physical port to which the interface will be bound. Ports are identified by the chassis slot number where the line card resides in, followed by the number of the physical connector on the line card. For example, port 17/1 identifies connector number 1 on the card in slot 17. A single physical port can facilitate multiple interfaces. numeric) by which the physical port will be recognized by the system. Multiple descriptions are needed if multiple ports will be used. Physical ports are configured within the source context and are used to bind logical PDN interfaces. Used when configuring static routes from the PDN interface(s) to a specific network. LNS service Configuration LNS service name Authentication protocols used Domain alias for NAI-construction Maximum number of sessions per tunnel This is an identification string between 1 and 63 characters (alpha and/or numeric) by which the LNS service will be recognized by the system. Multiple names are needed if multiple LNS services will be used. LNS services are configured in the source context. Specifies how the system handles authentication: using a protocol (such as CHAP, PAP, or MSCHAP), or not requiring any authentication. Specifies a context name for the system to use to provide accounting functionality for a subscriber session. This parameter is needed only if the system is configured to support no authentication. This defines the maximum number of sessions supported by each tunnel facilitated by the LNS service. The number can be configured to any integer value from 1 to The default is

4 Information Required Maximum number of tunnels Peer LAC This defines the maximum number of tunnels supported by the LNS service. The number can be configured to any integer value from 1 to The default is IP address or network prefix and mask: The IP address of a specific peer LAC for which the LNS service terminates L2TP tunnels. The IP address must be expressed in dotted decimal notation. Multiple peer LACs can be configured. Alternately, to simplify configuration, a group of peer LACs can be specified by entering a network prefix and a mask. Secret: The shared secret used by the LNS to authenticate the peer LAC. The secret can be from 1 to 256 alpha and/or numeric characters and is case sensitive. AAA Interface Configuration AAA interface name IP address and subnet Physical port number Physical port description Gateway IP address numeric) by which the interface will be recognized by the system. Multiple names are needed if multiple interfaces will be configured. AAA interfaces will be configured in the source context. These will be assigned to the AAA interface. Multiple addresses and/or subnets are needed if multiple interfaces will be configured. A single physical port can facilitate multiple interfaces. numeric) by which the physical port will be recognized by the system. Multiple descriptions are needed if multiple ports will be used. Physical ports are configured within the source context and are used to bind logical AAA interfaces. Used when configuring static routes from the AAA interface(s) to a specific network. RADIUS Server Configuration 4

5 Information Required RADIUS Authentication server IP Address: Specifies the IP address of the RADIUS authentication server the source context will communicate with to provide subscriber authentication functions. Multiple addresses are needed if multiple RADIUS servers will be configured. RADIUS authentication servers are configured within the source context. Multiple servers can be configured and each assigned a priority. Shared Secret: The shared secret is a string between 1 and 15 characters (alpha and/or numeric) that specifies the key that is exchanged between the RADIUS authentication server and the source context. A shared secret is needed for each configured RADIUS server. UDP Port Number: Specifies the port used by the source context and the RADIUS authentication server for communications. The UDP port number can be any integer value between 1 and The default value is RADIUS Accounting server IP Address: Specifies the IP address of the RADIUS accounting server that the source context will communicate with to provide subscriber accounting functions. Multiple addresses are needed if multiple RADIUS servers will be configured. RADIUS accounting servers are configured within the source context. Multiple servers can be configured and each assigned a priority. Shared Secret: The shared secret is a string between 1 and 15 characters (alpha and/or numeric) that specifies the key that is exchanged between the RADIUS accounting server and the source context. A shared secret is needed for each configured RADIUS server. UDP Port Number: Specifies the port used by the source context and the RADIUS Accounting server for communications. The UDP port number can be any integer value between 1 and The default value is RADIUS attribute NAS Identifier RADIUS NAS IP address Specifies the name by which the source context will be identified in the Access-Request message(s) it sends to the RADIUS server. The name must be between 1 and 32 alpha and/or numeric characters and is case sensitive. Specifies the IP address of the source context's AAA interface. A secondary IP address interface can optionally be configured. Default Subscriber Configuration 5

6 Information Required "Default" subscriber's IP context name Specifies the name of the egress context on the system that facilitates the PDN ports. Important For this configuration, the IP context name should be identical to the name of the destination context. Destination Context Configuration The following table lists the information that is required to configure the destination context. Table 2: for Destination Context Configuration Destination context name numeric) by which the destination context will be recognized by the system. Important For this configuration, the destination context name should not match the domain name of a specific domain. PDN Interface Configuration PDN interface name IP address and subnet Physical port number Physical port description(s) Gateway IP address(es) numeric) by which the interface will be recognized by the system. Multiple names are needed if multiple interfaces will be configured. PDN interfaces are used to connect to a packet network and are configured in the destination context. These will be assigned to the PDN interface. Multiple addresses and/or subnets are needed if multiple interfaces will be configured. A single physical port can facilitate multiple interfaces. numeric) by which the physical port will be recognized by the system. Multiple descriptions will be needed if multiple ports will be used. Physical ports are configured within the destination context and are used to bind logical PDN interfaces. Used when configuring static routes from the PDN interface(s) to a specific network. IP Address Pool Configuration (optional) 6

7 How This Configuration Works IP address pool name(s) IP pool addresses If IP address pools will be configured in the destination context(s), names or identifiers will be needed for them. The pool name can be between 1 and 31 alpha and/or numeric characters and is case sensitive. An initial address and a subnet, or a starting address and an ending address, are required for each configured pool. The pool will then consist of every possible address within the subnet, or all addresses from the starting address to the ending address. The pool can be configured as public, private, or static. How This Configuration Works The following figure and the text that follows describe how this LNS service configuration with a single source and destination context would be used by the system to terminate an L2TP tunnel. Figure 2: Call Processing Using a Single Source and Destination Context 1 An L2TP tunnel request from a peer LAC is received by the LNS service. The tunnel is to facilitate a subscriber session. 2 The LAC and LNS establish the L2TP tunnel according to the procedures defined in RFC Once the L2TP tunnel is established, subscriber L2TP sessions can be established. 3 The LNS service determines which context to use in providing AAA functionality for the subscriber session if authentication is enabled for the LNS service. For more information on this process, refer How the System Selects Contexts in System Administration Guide. 7

8 Configuring the System to Support LNS Functionality For this example, the result of this process is that LNS service determined that AAA functionality should be provided by the Source context. 4 The system communicates with the AAA server specified in the Source context's AAA configuration to authenticate the subscriber. 5 Upon successful authentication, the LNS service terminates the subscriber's PPP datagrams from the L2TP session and the system determines which egress context to use for the subscriber session. For more information on egress context selection process, refer How the System Selects Contexts in System Administration Guide. The system determines that the egress context is the destination context based on the configuration of either the Default subscriber's ip-context name or from the SN-VPN-NAME or SN1-VPN-NAME attributes that is configured in the subscriber's RADIUS profile. 6 Data traffic for the subscriber session is routed through the PDN interface in the Destination context. 7 Accounting information for the session is sent to the AAA server over the AAA interface. Configuring the System to Support LNS Functionality Many of the procedures required to configure the system to support LNS functionality are provided in the System Administration Guide. The System Administration Guide provides information and procedures for configuring contexts, interfaces and ports, AAA functionality, and IP address pools on the system. This section provides information and instructions for configuring LNS services on the system allowing it to communicate with peer LAC nodes. Important This section provides the minimum instruction set for configuring an LNS service allowing the system to terminate L2TP tunnels and process data sessions. For more information on commands that configure additional LNS service properties, refer LNS Configuration Mode Commands chapter in Command Line Interface Reference. 8

9 Creating and Binding LNS Service To configure the system to provide access control list facility to subscribers: Step 1 Step 2 Step 3 Step 4 Step 5 Step 6 Step 7 Create the LNS service and bind it to an interface IP address by applying the example configuration in the Creating and Binding LNS Service section. Specify the authentication parameters for LNS service by applying the example configuration in the Configuring Authentication Parameters for LNS Service section. Configure the maximum number of tunnels supported by the LNS service and maximum number of sessions supported per tunnel by applying the example configuration in the Configuring Tunnel and Session Parameters for LNS Service section. Configure peer LACs for the LNS service by applying the example configuration in the Configuring Tunnel and Session Parameters for LNS Service section. Optional. Specify the domain alias designated for the context which the LNS service uses for AAA functionality by applying the example configuration in the Configuring Domain Alias for AAA Subscribers section. Verify your LNS service configuration by following the steps in the Verifying the LNS Service Configuration section. Save your configuration to flash memory, an external memory device, and/or a network location using the Exec mode command save configuration. For additional information on how to verify and save configuration files, refer to the System Administration Guide and the Command Line Interface Reference. Creating and Binding LNS Service Use the following example to create the LNS service and bind the IP address to it: configure context <dest_ctxt_name> -noconfirm lns-service <lns_svc_name> -noconfirm bind address <ip_address> [ max-subscribers <max_subscriber> ] end Notes: LNS service has to be configured in destination context. Bind address is the interface address that is to serve as an L2TP PDN interface. Multiple addresses on the same IP interface can be bound to different LNS services. However, each address can be bound to only one LNS service. In addition, the LNS service can not be bound to the same interface as other services such as a LAC service. Configuring Authentication Parameters for LNS Service Use the following example to authentication parameters for LNS service: configure context <dest_ctxt_name> lns-service <lns_svc_name> authentication { { [ allow-noauth chap <pref> mschap <pref> pap <pref> ] } msid-auth } end 9

10 Configuring Tunnel and Session Parameters for LNS Service Note: For more information on authentication procedure and priorities, refer authentication command section in LNS Configuration Mode Commands chapter of the Command Line Interface Reference. Configuring Tunnel and Session Parameters for LNS Service Use the following example to configure the tunnel and session parameters for LNS service: configure context <dest_ctxt_name> lns-service <lns_svc_name> max-tunnel <max_tunnels> max-session-per-tunnel <max_sessions> end Note: For more information on tunnel and session related parameters, refer LNS Configuration Mode Commands chapter of the Command Line Interface Reference. Configuring Peer LAC servers for LNS Service Use the following example to configure the peer LAC servers for LNS service: configure context <dest_ctxt_name> lns-service <lns_svc_name> peer-lac { <lac_ip_address> <ip_address>/<mask> } [ encrypted ] secret <secret_string> [ description <desc_text> ] end Note: Multiple LACs can be configured with this command. For more information, refer LNS Configuration Mode Commands chapter of the Command Line Interface Reference. Configuring Domain Alias for AAA Subscribers Use the following example to create the LNS service and bind the IP address to it: configure context <dest_ctxt_name> -noconfirm lns-service <lns_svc_name> -noconfirm nai-construct domain <domain_alias> end Notes: If this command is enabled, an NAI is constructed for the subscriber in the event that their mobile node does not negotiate CHAP, PAP, or MSCHAP. If this option is selected, no further attempts are made to authenticate the user. Instead, the constructed NAI is used for accounting purposes. 10

11 Verifying the LNS Service Configuration Important This command should only be used if the LNS service is configured to allow "no authentication" using the authentication allow-noauth command. Verifying the LNS Service Configuration These instructions are used to verify the LNS service configuration. Verify that your LNS service configuration by entering the following command in Exec Mode: show lns-service name service_name The output of this command displays the configuration of the LNS service and should appear similar to that shown below. Service name: testlns Context: test Bind: Not Done Local IP Address: First Retransmission Timeout: 1 (secs) Max Retransmission Timeout: 8 (secs) Max Retransmissions: 5 Setup Timeout: 60 (secs) Max Sessions: Max Tunnels: Max Sessions Per Tunnel: Keep-alive Interval: 60 Control Receive Window: 16 Data Sequence Numbers: Enabled Tunnel Authentication: Enabled Tunnel Switching: Enabled Max Tunnel Challenge Length: 16 PPP Authentication: CHAP 1 PAP 2 Allow Noauthentication: Disabled MSID Authentication: Disabled No NAI Construct Domain defined No Default Subscriber defined IP Src Violation Reneg Limit: 5 IP Src Violation Drop Limit: 10 IP Src Violation Period: 120 (secs) Service Status: Not started Newcall Policy: None 11

12 Verifying the LNS Service Configuration 12

L2TP Access Concentrator

L2TP Access Concentrator This chapter describes the Layer 2 Tunneling Protocol (L2TP) Access Concentrator (LAC) functionality support on Cisco ASR 5x00 chassis and explains how it is configured. The product Administration Guides

More information

GGSN Configuration Example

GGSN Configuration Example This chapter provides information for configuring the system to function as a Gateway GPRS Support Node (GGSN) in General Packet Radio Service (GPRS) or Universal Mobile Telecommunications System (UMTS)

More information

PDSN Service Configuration Mode Commands

PDSN Service Configuration Mode Commands Service Configuration Mode Commands The Service Configuration Mode is used to create and manage service instances for the current context. Important The commands or keywords/variables that are available

More information

Configuring the Physical Subscriber Line for RADIUS Access and Accounting

Configuring the Physical Subscriber Line for RADIUS Access and Accounting Configuring the Physical Subscriber Line for RADIUS Access and Accounting Configuring a physical subscriber line for RADIUS Access and Accounting enables an L2TP access concentrator (LAC) and an L2TP network

More information

This chapter provides configuration information for the HRPD Serving Gateway (HSGW).

This chapter provides configuration information for the HRPD Serving Gateway (HSGW). This chapter provides configuration information for the HRPD Serving Gateway (HSGW). Important Information about all commands in this chapter can be found in the Command Line Interface Reference. Because

More information

This chapter provides configuration information for the HRPD Serving Gateway (HSGW).

This chapter provides configuration information for the HRPD Serving Gateway (HSGW). This chapter provides configuration information for the HRPD Serving Gateway (HSGW). Important Information about all commands in this chapter can be found in the Command Line Interface Reference. Because

More information

Understanding the authentication imsi-auth msisdn-auth Configuration for Corporate L2TP APNs

Understanding the authentication imsi-auth msisdn-auth Configuration for Corporate L2TP APNs Understanding the authentication imsi-auth msisdn-auth Configuration for Corporate L2TP APNs Contents Introduction Problem: The msisdn-auth and imsi-auth APN Configuration Options have a Speciffic (non

More information

IP Tunneling. GRE Tunnel IP Source and Destination VRF Membership. Tunnel VRF CHAPTER

IP Tunneling. GRE Tunnel IP Source and Destination VRF Membership. Tunnel VRF CHAPTER CHAPTER 27 This chapter describes IP tunneling features implemented on the Cisco 10000 series routers and includes the following topics: GRE Tunnel IP Source and Destination VRF Membership, page 27-1 Restrictions

More information

Service Configurations

Service Configurations This chapter describes how to various StarOS services to support IPSec. The following topics are discussed: FA Services Configuration to Support IPSec, page 1 HA Service Configuration to Support IPSec,

More information

Configuring the Physical Subscriber Line for RADIUS Access and Accounting

Configuring the Physical Subscriber Line for RADIUS Access and Accounting Configuring the Physical Subscriber Line for RADIUS Access and Accounting Last Updated: December 5, 2011 Configuring a physical subscriber line for RADIUS Access and Accounting enables an L2TP access concentrator

More information

FA Service Configuration Mode Commands

FA Service Configuration Mode Commands FA Service Configuration Mode Commands The Foreign Agent Service Configuration Mode is used to create and manage the Foreign Agent (FA) services associated with the current context. Important The commands

More information

RADIUS Logical Line ID

RADIUS Logical Line ID The feature, also known as the Logical Line Identification (LLID) Blocking feature enables administrators to track their customers on the basis of the physical lines on which customer calls originate.

More information

DPX8000 Series Deep Service Switching Gateway User Configuration Guide BRAS Service Board Module v1.0

DPX8000 Series Deep Service Switching Gateway User Configuration Guide BRAS Service Board Module v1.0 DPX8000 Series Deep Service Switching Gateway User Configuration Guide BRAS Service Board Module v1.0 i Hangzhou DPtech Technologies Co., Ltd. provides full- range technical support. If you need any help,

More information

Configuring Security on the GGSN

Configuring Security on the GGSN CHAPTER 12 This chapter describes how to configure security features on the gateway GPRS support node (GGSN), including Authentication, Authorization, and Accounting (AAA), and RADIUS. IPSec on the Cisco

More information

L2TP Configuration. L2TP Overview. Introduction. Typical L2TP Networking Application

L2TP Configuration. L2TP Overview. Introduction. Typical L2TP Networking Application Table of Contents L2TP Configuration 1 L2TP Overview 1 Introduction 1 Typical L2TP Networking Application 1 Basic Concepts of L2TP 2 L2TP Tunneling Modes and Tunnel Establishment Process 4 L2TP Features

More information

RADIUS Tunnel Attribute Extensions

RADIUS Tunnel Attribute Extensions The feature allows a name to be specified (other than the default) for the tunnel initiator and the tunnel terminator in order to establish a higher level of security when setting up VPN tunneling. Finding

More information

L2TP over IPsec. About L2TP over IPsec/IKEv1 VPN

L2TP over IPsec. About L2TP over IPsec/IKEv1 VPN This chapter describes how to configure /IKEv1 on the ASA. About /IKEv1 VPN, on page 1 Licensing Requirements for, on page 3 Prerequisites for Configuring, on page 4 Guidelines and Limitations, on page

More information

DHCP Server RADIUS Proxy

DHCP Server RADIUS Proxy The Dynamic Host Configuration Protocol (DHCP) Server RADIUS Proxy is a RADIUS-based address assignment mechanism in which a DHCP server authorizes remote clients and allocates addresses based on replies

More information

RADIUS Vendor-Specific Attributes (VSA) and RADIUS Disconnect-Cause Attribute Values

RADIUS Vendor-Specific Attributes (VSA) and RADIUS Disconnect-Cause Attribute Values RADIUS Vendor-Specific Attributes (VSA) and RADIUS Disconnect-Cause Attribute Values First Published: September 23, 2005 Last Updated: August 18, 2010 The Internet Engineering Task Force (IETF) draft standard

More information

thus, the newly created attribute is accepted if the user accepts attribute 26.

thus, the newly created attribute is accepted if the user accepts attribute 26. Remote Authentication Dial-In User Service (RADIUS) attributes are used to define specific authentication, authorization, and accounting (AAA) elements in a user profile, which is stored on the RADIUS

More information

Configuring Client-Initiated Dial-In VPDN Tunneling

Configuring Client-Initiated Dial-In VPDN Tunneling Configuring Client-Initiated Dial-In VPDN Tunneling Client-initiated dial-in virtual private dialup networking (VPDN) tunneling deployments allow remote users to access a private network over a shared

More information

RADIUS Attributes. RADIUS IETF Attributes

RADIUS Attributes. RADIUS IETF Attributes Remote Authentication Dial-In User Service (RADIUS) attributes are used to define specific authentication, authorization, and accounting (AAA) elements in a user profile, which is stored on the RADIUS

More information

Configuring L2TP over IPsec

Configuring L2TP over IPsec CHAPTER 62 This chapter describes how to configure L2TP over IPsec on the ASA. This chapter includes the following topics: Information About L2TP over IPsec, page 62-1 Licensing Requirements for L2TP over

More information

The MSCHAP Version 2 feature (introduced in Cisco IOS Release 12.2(2)XB5) allows Cisco routers to

The MSCHAP Version 2 feature (introduced in Cisco IOS Release 12.2(2)XB5) allows Cisco routers to The feature (introduced in Cisco IOS Release 12.2(2)XB5) allows Cisco routers to utilize Microsoft Challenge Handshake Authentication Protocol Version 2 (MSCHAP V2) authentication for PPP connections between

More information

Configuring PPP over Ethernet with NAT

Configuring PPP over Ethernet with NAT CHAPTER 3 The Cisco Secure Router 520 Ethernet-to-Ethernet routers support Point-to-Point Protocol over Ethernet (PPPoE) clients and network address translation (NAT). Multiple PCs can be connected to

More information

Configuring Dynamic Addressing on the GGSN

Configuring Dynamic Addressing on the GGSN CHAPTER 11 This chapter describes how to configure dynamic IP addressing on the gateway GRPS support node (GGSN). The tasks in this chapter apply to IPv4 PDP contexts only. For information on IPv6 addressing,

More information

IPSec Network Applications

IPSec Network Applications This chapter describes several methods for implementing IPSec within various network applications. Topics discussed in this chapter include: Implementing IPSec for PDN Access Applications, page 1 Implementing

More information

BGP MPLS VPNs. Introduction

BGP MPLS VPNs. Introduction This chapter describes services that are supported for Border Gateway Protocol (BGP) Multi-Protocol Label Switching (MPLS) Virtual Private Networks (VPNs). MPLS is a licensed Cisco feature that requires

More information

aaa max-sessions maximum-number-of-sessions The default value for aaa max-sessions command is platform dependent. Release 15.0(1)M.

aaa max-sessions maximum-number-of-sessions The default value for aaa max-sessions command is platform dependent. Release 15.0(1)M. aaa max-sessions aaa max-sessions To set the maximum number of simultaneous authentication, authorization, and accounting (AAA) connections permitted for a user, use the aaa max-sessions command in global

More information

This chapter includes the following sections: Overview, on page 1 How Proxy Mobile IP Works in 3GPP Network, on page 11

This chapter includes the following sections: Overview, on page 1 How Proxy Mobile IP Works in 3GPP Network, on page 11 This chapter describes system support for Proxy Mobile IP and explains how it is configured. The product administration guides provide examples and procedures for configuration of basic services on the

More information

Overview, page 1 How Proxy Mobile IP Works in 3GPP Network, page 10

Overview, page 1 How Proxy Mobile IP Works in 3GPP Network, page 10 This chapter describes system support for Proxy Mobile IP and explains how it is configured. The product administration guides provide examples and procedures for configuration of basic services on the

More information

AAA Server Groups. Finding Feature Information. Information About AAA Server Groups. AAA Server Groups

AAA Server Groups. Finding Feature Information. Information About AAA Server Groups. AAA Server Groups Configuring a device to use authentication, authorization, and accounting (AAA) server groups provides a way to group existing server hosts. Grouping existing server hosts allows you to select a subset

More information

Provisioning Broadband Aggregators Topics

Provisioning Broadband Aggregators Topics CHAPTER 7 The Cisco Broadband Access Center software enables you to provision services on broadband aggregators. Provisioning occurs after you create administrative networks and network devices. See Chapter

More information

Multi-Protocol Label Switching (MPLS) Support

Multi-Protocol Label Switching (MPLS) Support This chapter describes the system's support for BGP/MPLS VPN and explains how it is d. The product administration guides provide examples and procedures for configuration of basic services on specific

More information

virtual-template virtual-template template-number no virtual-template Syntax Description

virtual-template virtual-template template-number no virtual-template Syntax Description VPDN Commands virtual-template virtual-template To specify which virtual template will be used to clone virtual access interfaces (VAI), use the virtual-template command in BBA group configuration mode

More information

PPPoE Session Limit per NAS Port

PPPoE Session Limit per NAS Port PPPoE Session Limit per NAS Port First Published: March 17, 2003 Last Updated: February 28, 2006 The PPPoE Session Limit per NAS Port feature enables you to limit the number of PPP over Ethernet (PPPoE)

More information

RADIUS Attribute 66 Tunnel-Client-Endpoint Enhancements

RADIUS Attribute 66 Tunnel-Client-Endpoint Enhancements RADIUS Attribute 66 Tunnel-Client-Endpoint The RADIUS Attribute 66 (Tunnel-Client-Endpoint) feature allows the hostname of the network access server (NAS) to be specified--rather than the IP address of

More information

Context Configuration Mode Commands N-R

Context Configuration Mode Commands N-R Context Configuration Mode Commands N-R This section includes the commands nw-reachability server through router service. Important The commands or keywords/variables that are available are dependent on

More information

Configuring the PPPoE Client

Configuring the PPPoE Client CHAPTER 72 This section describes how to configure the PPPoE client provided with the ASA. It includes the following topics: PPPoE Client Overview, page 72-1 Username and Password, page 72-2 Enabling PPPoE,

More information

Redundant IPSec Tunnel Fail-over

Redundant IPSec Tunnel Fail-over This chapter describes the redundant IPSec tunnel fail-over feature and dead peer detection (DPD). The following topics are discussed: (IKEv1), page 1 Dead Peer Detection (DPD) Configuration, page 4 (IKEv1)

More information

RADIUS Vendor-Specific Attributes and RADIUS Disconnect-Cause Attribute Values

RADIUS Vendor-Specific Attributes and RADIUS Disconnect-Cause Attribute Values RADIUS s and RADIUS Disconnect-Cause Values The Internet Engineering Task Force (IETF) draft standard specifies a method for communicating vendor-specific information between the network access server

More information

PPP configuration commands

PPP configuration commands Contents PPP configuration commands 1 ip address ppp-negotiate 1 ip pool 1 link-protocol ppp 2 ppp authentication-mode 2 ppp chap password 4 ppp chap user 5 ppp ipcp remote-address forced 5 ppp pap local-user

More information

Dynamic Domain Name Server Updates

Dynamic Domain Name Server Updates CHAPTER 9 This chapter discusses DNS update methods and Server Address assignment, and provides configuration details of those features. This chapter contains the following sections: IP Reachability, page

More information

Configuring the DHCP Server On-Demand Address Pool Manager

Configuring the DHCP Server On-Demand Address Pool Manager Configuring the DHCP Server On-Demand Address Pool Manager The Cisco IOS XE DHCP server on-demand address pool (ODAP) manager is used to centralize the management of large pools of addresses and simplify

More information

thus, the newly created attribute is accepted if the user accepts attribute 26.

thus, the newly created attribute is accepted if the user accepts attribute 26. Remote Authentication Dial-In User Service (RADIUS) attributes are used to define specific authentication, authorization, and accounting (AAA) elements in a user profile, which is stored on the RADIUS

More information

RADIUS for Multiple UDP Ports

RADIUS for Multiple UDP Ports RADIUS security servers are identified on the basis of their hostname or IP address, hostname and specific UDP port numbers, or IP address and specific UDP port numbers. The combination of the IP address

More information

Configuring Dynamic Addressing on the GGSN

Configuring Dynamic Addressing on the GGSN CHAPTER 13 This chapter describes how to configure dynamic IP addressing on the gateway GRPS support node (GGSN). Note Dynamic IP addressing is not supported for IPv6 and PPP PDP types. Therefore, the

More information

QoS: Classification, Policing, and Marking on LAC Configuration Guide, Cisco IOS Release 12.4T

QoS: Classification, Policing, and Marking on LAC Configuration Guide, Cisco IOS Release 12.4T QoS: Classification, Policing, and Marking on LAC Configuration Guide, Cisco IOS Release 12.4T Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com

More information

PIX/ASA/FWSM Platform User Interface Reference

PIX/ASA/FWSM Platform User Interface Reference CHAPTER 50 PIX/ASA/FWSM Platform User Interface Reference The following topics describe the options available for configuring and managing security services and policies for PIX firewalls, Firewall Services

More information

DHCP Service Configuration Mode Commands

DHCP Service Configuration Mode Commands DHCP Service Configuration Mode Commands The Dynamic Host Control Protocol (DHCP) Configuration Mode is used to create and manage DHCP service instances for the current context. The commands or keywords/variables

More information

RADIUS NAS-IP-Address Attribute Configurability

RADIUS NAS-IP-Address Attribute Configurability RADIUS NAS-IP-Address Attribute The RADIUS NAS-IP-Address Attribute feature allows you to configure an arbitrary IP address to be used as RADIUS attribute 4, NAS-IP-Address, without changing the source

More information

IPv6 and xdsl. Athanassios Liakopoulos Slovenian IPv6 Training, Ljubljana, May 2010

IPv6 and xdsl. Athanassios Liakopoulos Slovenian IPv6 Training, Ljubljana, May 2010 IPv6 and xdsl Athanassios Liakopoulos (aliako@grnet.gr) Slovenian IPv6 Training, Ljubljana, May 2010 Copy... Rights This slide set is the ownership of the 6DEPLOY project via its partners The Powerpoint

More information

Configuring the DHCP Server On-Demand Address Pool Manager

Configuring the DHCP Server On-Demand Address Pool Manager Configuring the DHCP Server On-Demand Address Pool Manager The Cisco IOS XE DHCP server on-demand address pool (ODAP) manager is used to centralize the management of large pools of addresses and simplify

More information

L2TP IPsec Support for NAT and PAT Windows Clients

L2TP IPsec Support for NAT and PAT Windows Clients L2TP IPsec Support for NAT and PAT Windows Clients The L2TP IPsec Support for NAT and PAT Windows Clients feature allows mulitple Windows client to connect to an IPsec-enabled Cisco IOS Layer 2 Tunneling

More information

DPX8000 Series Deep Service Switching Gateway User Configuration Guide Probe Service Board Module v1.0

DPX8000 Series Deep Service Switching Gateway User Configuration Guide Probe Service Board Module v1.0 DPX8000 Series Deep Service Switching Gateway User Configuration Guide Probe Service Board Module v1.0 i Hangzhou DPtech Technologies Co., Ltd. provides full- range technical support. If you need any help,

More information

Configuring Layer 2 Tunneling Protocol (L2TP) over IPSec

Configuring Layer 2 Tunneling Protocol (L2TP) over IPSec Configuring Layer 2 Tunneling Protocol (L2TP) over IPSec Document ID: 14122 Introduction Prerequisites Requirements Components Used Conventions Configure Network Diagram Configurations Verify Troubleshoot

More information

RADIUS Tunnel Preference for Load Balancing

RADIUS Tunnel Preference for Load Balancing RADIUS Tunnel Preference for Load Balancing and Fail-Over Finding Feature Information RADIUS Tunnel Preference for Load Balancing and Fail-Over Last Updated: July 18, 2011 The RADIUS Tunnel Preference

More information

H3C Firewall and UTM Devices L2TP VPN Virtual Firewall Configuration Examples (Comware V5)

H3C Firewall and UTM Devices L2TP VPN Virtual Firewall Configuration Examples (Comware V5) H3C Firewall and UTM Devices L2TP VPN Virtual Firewall Configuration Examples (Comware V5) Copyright 2015 Hangzhou H3C Technologies Co., Ltd. All rights reserved. No part of this manual may be reproduced

More information

Configuring PPP over Ethernet with NAT

Configuring PPP over Ethernet with NAT This chapter provides an overview of Point-to-Point Protocol over Ethernet (PPPoE) clients and network address translation (NAT) that can be configured on the Cisco 819, Cisco 860, Cisco 880, and Cisco

More information

Configuring the Managed IPv6 Layer 2 Tunnel Protocol Network Server

Configuring the Managed IPv6 Layer 2 Tunnel Protocol Network Server Configuring the Managed IPv6 Layer 2 Tunnel Protocol Network Server This document describes how to enable the Managed IPv6 Layer 2 Tunnel Protocol Network Server feature. Finding Feature Information, page

More information

Cisco ASR 9000 Series Aggregation Services Router Broadband Network Gateway Command Reference, Release 4.2.x

Cisco ASR 9000 Series Aggregation Services Router Broadband Network Gateway Command Reference, Release 4.2.x Cisco ASR 9000 Series Aggregation Services Router Broadband Network Gateway Command Reference, Release 4.2.x First Published: 2011-12-01 Last Modified: 2012-06-01 Americas Headquarters Cisco Systems, Inc.

More information

VPN Ports and LAN-to-LAN Tunnels

VPN Ports and LAN-to-LAN Tunnels CHAPTER 6 A VPN port is a virtual port which handles tunneled traffic. Tunnels are virtual point-to-point connections through a public network such as the Internet. All packets sent through a VPN tunnel

More information

How to Configure BGP over IKEv2 IPsec Site-to- Site VPN to an Google Cloud VPN Gateway

How to Configure BGP over IKEv2 IPsec Site-to- Site VPN to an Google Cloud VPN Gateway How to Configure BGP over IKEv2 IPsec Site-to- Site VPN to an Google Cloud VPN Gateway To connect to the Google Cloud VPN gateway, create an IPsec IKEv2 site-to-site VPN tunnel on your F-Series Firewall

More information

ppp accounting through quit

ppp accounting through quit ppp accounting through quit ppp accounting, page 3 ppp authentication, page 5 ppp authentication ms-chap-v2, page 9 ppp authorization, page 11 ppp chap hostname, page 13 ppp chap password, page 15 ppp

More information

show aaa servers sg show aaa servers sg sg-name Syntax Description

show aaa servers sg show aaa servers sg sg-name Syntax Description show aaa servers sg show aaa servers sg To display counters (information about the number of packets sent to and received from authentication, authorization, and accounting [AAA] servers) for all the servers

More information

CBS Service Configuration Mode Commands

CBS Service Configuration Mode Commands Important In Release 20.0, HNBGW is not supported. Commands in this configuration mode must not be used in Release 20.0. For more information, contact your Cisco account representative. The Cell Broadcasting

More information

Lawful Intercept Architecture

Lawful Intercept Architecture The Lawful Intercept (LI) feature supports service providers in meeting the requirements of law enforcement agencies (LEA) to provide electronic surveillance as authorized by a judicial or administrative

More information

RADIUS Attributes Overview and RADIUS IETF Attributes

RADIUS Attributes Overview and RADIUS IETF Attributes RADIUS Attributes Overview and RADIUS IETF Attributes Remote Authentication Dial-In User Service (RADIUS) attributes are used to define specific authentication, authorization, and accounting (AAA) elements

More information

HP VSR1000 Virtual Services Router

HP VSR1000 Virtual Services Router HP VSR1000 Virtual Services Router Layer 2 - WAN Access Configuration Guide Part number: 5998-6023 Software version: VSR1000_HP-CMW710-R0202-X64 Document version: 6W100-20140418 Legal and notice information

More information

Vendor-Proprietary Attribute

Vendor-Proprietary Attribute RADIUS s The IETF draft standard for RADIUS specifies a method for communicating vendor-proprietary information between the network access server and the RADIUS server. However, some vendors have extended

More information

Configuring NAS-Initiated Dial-In VPDN Tunneling

Configuring NAS-Initiated Dial-In VPDN Tunneling Configuring NAS-Initiated Dial-In VPDN Tunneling Network access server (NAS)-initiated dial-in tunneling provides secure tunneling of a PPP session from a NAS to a tunnel server without any special knowledge

More information

DHCP Overview. Information About DHCP. DHCP Overview

DHCP Overview. Information About DHCP. DHCP Overview The Dynamic Host Configuration Protocol (DHCP) is based on the Bootstrap Protocol (BOOTP), which provides the framework for passing configuration information to hosts on a TCP/IP network. DHCP adds the

More information

RADIUS Commands. Cisco IOS Security Command Reference SR

RADIUS Commands. Cisco IOS Security Command Reference SR RADIUS Commands This chapter describes the commands used to configure RADIUS. RADIUS is a distributed client/server system that secures networks against unauthorized access. In the Cisco implementation,

More information

System Operation and Configuration

System Operation and Configuration The ASR 5500 is designed to provide subscriber management services for high-capacity 4G wireless networks. Before you connect to the command line interface (CLI) and begin system configuration, you must

More information

RADIUS Vendor-Proprietary Attributes

RADIUS Vendor-Proprietary Attributes RADIUS Vendor-Proprietary Attributes Last Updated: January 17, 2012 The IETF draft standard for RADIUS specifies a method for communicating vendor-proprietary information between the network access server

More information

Configuring RADIUS. Finding Feature Information. Prerequisites for RADIUS

Configuring RADIUS. Finding Feature Information. Prerequisites for RADIUS The RADIUS security system is a distributed client/server system that secures networks against unauthorized access. In the Cisco implementation, RADIUS clients run on Cisco devices and send authentication

More information

This chapter describes the support of Non-IP PDN on P-GW and S-GW.

This chapter describes the support of Non-IP PDN on P-GW and S-GW. This chapter describes the support of Non-IP PDN on P-GW and S-GW. Feature Summary and Revision History, page 1 Feature Description, page 2 How It Works, page 2 Configuring Non-IP PDN, page 8 Monitoring

More information

Per VRF AAA. Finding Feature Information. Last Updated: January 18, 2012

Per VRF AAA. Finding Feature Information. Last Updated: January 18, 2012 Per VRF AAA Last Updated: January 18, 2012 The Per VRF AAA feature allows ISPs to partition authentication, authorization, and accounting (AAA) services on the basis of Virtual Private Network (VPN) routing

More information

SSG Configuration Example

SSG Configuration Example APPENDIX A Example A-1 is a sample SSG configuration for the Cisco 10000 series router based on the topology in Figure A-1. The configuration includes AAA, PPP, SSG, and RADIUS. The SSG configuration enables

More information

Configuring Authorization

Configuring Authorization The AAA authorization feature is used to determine what a user can and cannot do. When AAA authorization is enabled, the network access server uses information retrieved from the user s profile, which

More information

SonicWALL Addendum. A Supplement to the SonicWALL Internet Security Appliance User's Guide

SonicWALL Addendum. A Supplement to the SonicWALL Internet Security Appliance User's Guide SonicWALL 6.2.0.0 Addendum A Supplement to the SonicWALL Internet Security Appliance User's Guide Contents SonicWALL Addendum 6.2.0.0... 3 New Network Features... 3 NAT with L2TP Client... 3 New Tools

More information

Overview. RADIUS Protocol CHAPTER

Overview. RADIUS Protocol CHAPTER CHAPTER 1 The chapter provides an overview of the RADIUS server, including connection steps, RADIUS message types, and using Cisco Access Registrar as a proxy server. Cisco Access Registrar is a RADIUS

More information

Operation Manual AAA RADIUS HWTACACS H3C S5500-EI Series Ethernet Switches. Table of Contents

Operation Manual AAA RADIUS HWTACACS H3C S5500-EI Series Ethernet Switches. Table of Contents Table of Contents Table of Contents... 1-1 1.1 AAA/RADIUS/HWTACACS Over... 1-1 1.1.1 Introduction to AAA... 1-1 1.1.2 Introduction to RADIUS... 1-3 1.1.3 Introduction to HWTACACS... 1-9 1.1.4 Protocols

More information

Session Recovery. How Session Recovery Works

Session Recovery. How Session Recovery Works With robust hardware failover and redundancy protection, any hardware or software failures on the system can quickly be corrected. However, software failures can occur for numerous reasons, often without

More information

Configuring Additional VPDN Features

Configuring Additional VPDN Features This module documents concepts and tasks associated with configuring the following additional virtual private dialup network (VPDN) features: The following optional feature can be configured in isolation,

More information

A device that bridges the wireless link on one side to the wired network on the other.

A device that bridges the wireless link on one side to the wired network on the other. GLOSSARY A Access point Analog Channel ARP ATM ATO A device that bridges the wireless link on one side to the wired network on the other. A circuit-switched communication path intended to carry 3.1 KHz

More information

Configuring a VPN Using Easy VPN and an IPSec Tunnel, page 1

Configuring a VPN Using Easy VPN and an IPSec Tunnel, page 1 Configuring a VPN Using Easy VPN and an IPSec Tunnel This chapter provides an overview of the creation of Virtual Private Networks (VPNs) that can be configured on the Cisco 819, Cisco 860, and Cisco 880

More information

Configuring Network Access to the GGSN

Configuring Network Access to the GGSN CHAPTER 7 This chapter describes how to configure access from the gateway GPRS support node (GGSN) to a serving GPRS support node (SGSN), public data network (PDN), and optionally to a Virtual Private

More information

Configuring Authorization

Configuring Authorization Configuring Authorization AAA authorization enables you to limit the services available to a user. When AAA authorization is enabled, the network access server uses information retrieved from the user

More information

Configuring TACACS. Finding Feature Information. Prerequisites for Configuring TACACS

Configuring TACACS. Finding Feature Information. Prerequisites for Configuring TACACS TACACS+ is a security application that provides centralized validation of users attempting to gain access to a router or network access server. TACACS+ provides detailed accounting information and flexible

More information

Junos OS Release 12.1X47 Feature Guide

Junos OS Release 12.1X47 Feature Guide Junos OS Release 12.1X47 Feature Guide Junos OS Release 12.1X47-D15 19 November 2014 Revision 1 This feature guide accompanies Junos OS Release 12.1X47-D15. This guide contains detailed information about

More information

VPNS BY RICK FREY.

VPNS BY RICK FREY. VPNS BY RICK FREY www.rickfreyconsulting.com WHAT IS A VPN? A Virtual Private Network is a means by which two or more normally non-adjacent networks are connected through virtual wires. www.rickfreyconsulting.com

More information

Diameter NASREQ Application. Status of this Memo. This document is an Internet-Draft and is subject to all provisions of Section 10 of RFC2026.

Diameter NASREQ Application. Status of this Memo. This document is an Internet-Draft and is subject to all provisions of Section 10 of RFC2026. AAA Working Group Pat R. Calhoun Internet-Draft Black Storm Networks Category: Standards Track William Bulley Merit Network, Inc. Allan C. Rubens Tut Systems, Inc.

More information

Table of Contents 1 L2TP Configuration Commands 1-1

Table of Contents 1 L2TP Configuration Commands 1-1 Table of Contents 1 L2TP Configuration Commands 1-1 L2TP Configuration Commands 1-1 allow l2tp 1-1 display l2tp session 1-2 display l2tp tunnel 1-3 interface virtual-template 1-3 l2tp enable 1-4 l2tp sendaccm

More information

Configuring Resource Pool Management

Configuring Resource Pool Management Configuring Resource Pool Management This chapter describes the Cisco Resource Pool Management (RPM) feature. It includes the following main sections: RPM Overview How to Configure RPM Verifying RPM Components

More information

RADIUS Servers for AAA

RADIUS Servers for AAA This chapter describes how to configure RADIUS servers for AAA. About, page 1 Guidelines for, page 14 Configure, page 14 Test RADIUS Server Authentication and Authorization, page 19 Monitoring, page 19

More information

Configuring VPN from Proventia M Series Appliance to Proventia M Series Appliance

Configuring VPN from Proventia M Series Appliance to Proventia M Series Appliance Configuring VPN from Proventia M Series Appliance to Proventia M Series Appliance January 13, 2004 Overview Introduction This document describes how to configure a VPN tunnel from one Proventia M series

More information

Configuring Virtual Private Networks

Configuring Virtual Private Networks Configuring Virtual Private Networks This chapter describes how to configure, verify, maintain, and troubleshoot a Virtual Private Network (VPN). It includes the following main sections: VPN Technology

More information

Provisioning Flows Topics

Provisioning Flows Topics CHAPTER 3 The BAC software provides network and service management tools that enable the provisioning of devices and subscribers in broadband aggregation environments. BAC supports the role of the following

More information

VPN and IPsec. Network Administration Using Linux. Virtual Private Network and IPSec 04/2009

VPN and IPsec. Network Administration Using Linux. Virtual Private Network and IPSec 04/2009 VPN and IPsec Network Administration Using Linux Virtual Private Network and IPSec 04/2009 What is VPN? VPN is an emulation of a private Wide Area Network (WAN) using shared or public IP facilities. A

More information